Skip to content

Commit

Permalink
Merge branch 'main' into update-gatewayskus
Browse files Browse the repository at this point in the history
  • Loading branch information
oZakari authored Jan 23, 2025
2 parents 191217a + 1ded231 commit 33a53d9
Show file tree
Hide file tree
Showing 23 changed files with 73 additions and 73 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/bicep-build-to-validate.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down Expand Up @@ -121,7 +121,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
6 changes: 3 additions & 3 deletions .github/workflows/code-review.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down Expand Up @@ -51,7 +51,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand All @@ -61,7 +61,7 @@ jobs:
fetch-depth: 0

- name: Check links in markdown files
uses: gaurav-nelson/github-action-markdown-link-check@d53a906aa6b22b8979d33bc86170567e619495ec # 1.0.15
uses: gaurav-nelson/github-action-markdown-link-check@1b916f2cf6c36510a6059943104e3c42ce6c16bc # 1.0.16
with:
config-file: ".github/actions-config/mlc_config.json"
use-verbose-mode: "yes"
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/dependency-review.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/pr-title-check.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/psdocs-mdtogit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ jobs:
environment: BicepUpdateDocumentation
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-tests.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ jobs:

steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/scheduled-bicep-build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ jobs:

steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/scorecard.yml
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ jobs:
# actions: read
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/update-policy-china.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ jobs:
pull-requests: write
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/update-policy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ jobs:
pull-requests: write
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/wiki-sync.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ jobs:
pull-requests: write
steps:
- name: Harden Runner
uses: step-security/harden-runner@c95a14d0e5bab51a9f56296a4eb0e416910cd350 # v2.10.3
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
with:
egress-policy: audit

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ param parAcrSku string = 'Basic'
@sys.description('Tags to be applied to resource when deployed. Default: None')
param parTags object ={}

resource resAzureContainerRegistry 'Microsoft.ContainerRegistry/registries@2022-12-01' = {
resource resAzureContainerRegistry 'Microsoft.ContainerRegistry/registries@2023-07-01' = {
name: parAcrName
tags: parTags
location: parLocation
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -737,14 +737,14 @@ var varAzFirewallUseCustomPublicIps = length(parAzFirewallCustomPublicIps) > 0
var varAzFirewallUseCustomPublicIpsSecondaryLocation = length(parAzFirewallCustomPublicIpsSecondaryLocation) > 0

//DDos Protection plan will only be enabled if parDdosEnabled is true.
resource resDdosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2023-02-01' = if (parDdosEnabled) {
resource resDdosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2024-05-01' = if (parDdosEnabled) {
name: parDdosPlanName
location: parLocation
tags: parTags
}

//DDos Protection plan will only be enabled if parDdosEnabled is true.
resource resDdosProtectionPlanSecondaryLocation 'Microsoft.Network/ddosProtectionPlans@2023-02-01' = if (parDdosEnabledSecondaryLocation) {
resource resDdosProtectionPlanSecondaryLocation 'Microsoft.Network/ddosProtectionPlans@2024-05-01' = if (parDdosEnabledSecondaryLocation) {
name: parDdosPlanNameSecondaryLocation
location: parSecondaryLocation
tags: parTags
Expand All @@ -770,7 +770,7 @@ resource resDDoSProtectionPlanLockSecondaryLocation 'Microsoft.Authorization/loc
}
}

resource resHubVnet 'Microsoft.Network/virtualNetworks@2024-01-01' = {
resource resHubVnet 'Microsoft.Network/virtualNetworks@2024-05-01' = {
dependsOn: [
resBastionNsg
]
Expand All @@ -796,7 +796,7 @@ resource resHubVnet 'Microsoft.Network/virtualNetworks@2024-01-01' = {
}
}

resource resHubVnetSecondaryLocation 'Microsoft.Network/virtualNetworks@2024-01-01' = {
resource resHubVnetSecondaryLocation 'Microsoft.Network/virtualNetworks@2024-05-01' = {
dependsOn: [
resBastionNsgSecondaryLocation
]
Expand Down Expand Up @@ -904,17 +904,17 @@ module modBastionPublicIpSecondaryLocation '../publicIp/publicIp.bicep' = if (pa
}
}

resource resBastionSubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parAzBastionEnabled) {
resource resBastionSubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parAzBastionEnabled) {
parent: resHubVnet
name: 'AzureBastionSubnet'
}

resource resBastionSubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parAzBastionEnabledSecondaryLocation) {
resource resBastionSubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parAzBastionEnabledSecondaryLocation) {
parent: resHubVnetSecondaryLocation
name: 'AzureBastionSubnet'
}

resource resBastionNsg 'Microsoft.Network/networkSecurityGroups@2024-01-01' = if (parAzBastionEnabled) {
resource resBastionNsg 'Microsoft.Network/networkSecurityGroups@2024-05-01' = if (parAzBastionEnabled) {
name: parAzBastionNsgName
location: parLocation
tags: parTags
Expand Down Expand Up @@ -1063,7 +1063,7 @@ resource resBastionNsg 'Microsoft.Network/networkSecurityGroups@2024-01-01' = if
}
}

resource resBastionNsgSecondaryLocation 'Microsoft.Network/networkSecurityGroups@2024-01-01' = if (parAzBastionEnabledSecondaryLocation) {
resource resBastionNsgSecondaryLocation 'Microsoft.Network/networkSecurityGroups@2024-05-01' = if (parAzBastionEnabledSecondaryLocation) {
name: parAzBastionNsgNameSecondaryLocation
location: parSecondaryLocation
tags: parTags
Expand Down Expand Up @@ -1235,7 +1235,7 @@ resource resBastionNsgLockSecondaryLocation 'Microsoft.Authorization/locks@2020-
// AzureBastionSubnet is required to deploy Bastion service. This subnet must exist in the parsubnets array if you enable Bastion Service.
// There is a minimum subnet requirement of /27 prefix.
// If you are deploying standard this needs to be larger. https://docs.microsoft.com/en-us/azure/bastion/configuration-settings#subnet
resource resBastion 'Microsoft.Network/bastionHosts@2023-02-01' = if (parAzBastionEnabled) {
resource resBastion 'Microsoft.Network/bastionHosts@2024-05-01' = if (parAzBastionEnabled) {
location: parLocation
name: parAzBastionName
tags: parTags
Expand Down Expand Up @@ -1264,7 +1264,7 @@ resource resBastion 'Microsoft.Network/bastionHosts@2023-02-01' = if (parAzBasti
// AzureBastionSubnet is required to deploy Bastion service. This subnet must exist in the parsubnets array if you enable Bastion Service.
// There is a minimum subnet requirement of /27 prefix.
// If you are deploying standard this needs to be larger. https://docs.microsoft.com/en-us/azure/bastion/configuration-settings#subnet
resource resBastionSecondaryLocation 'Microsoft.Network/bastionHosts@2024-01-01' = if (parAzBastionEnabledSecondaryLocation) {
resource resBastionSecondaryLocation 'Microsoft.Network/bastionHosts@2024-05-01' = if (parAzBastionEnabledSecondaryLocation) {
location: parSecondaryLocation
name: parAzBastionNameSecondaryLocation
tags: parTags
Expand Down Expand Up @@ -1312,12 +1312,12 @@ resource resBastionLockSecondaryLocation 'Microsoft.Authorization/locks@2020-05-
}
}

resource resGatewaySubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parVpnGatewayEnabled || parExpressRouteGatewayEnabled) {
resource resGatewaySubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parVpnGatewayEnabled || parExpressRouteGatewayEnabled) {
parent: resHubVnet
name: 'GatewaySubnet'
}

resource resGatewaySubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parVpnGatewayEnabledSecondaryLocation || parExpressRouteGatewayEnabledSecondaryLocation) {
resource resGatewaySubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parVpnGatewayEnabledSecondaryLocation || parExpressRouteGatewayEnabledSecondaryLocation) {
parent: resHubVnetSecondaryLocation
name: 'GatewaySubnet'
}
Expand Down Expand Up @@ -1449,7 +1449,7 @@ module modGatewayPublicIpActiveActiveSecondaryLocation '../publicIp/publicIp.bic
]

//Minumum subnet size is /27 supporting documentation https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpn-gateway-settings#gwsub
resource resGateway 'Microsoft.Network/virtualNetworkGateways@2024-01-01' = [
resource resGateway 'Microsoft.Network/virtualNetworkGateways@2024-05-01' = [
for (gateway, i) in varGwConfig: if ((gateway.name != 'noconfigVpn') && (gateway.name != 'noconfigEr')) {
name: gateway.name
location: parLocation
Expand Down Expand Up @@ -1519,7 +1519,7 @@ resource resGateway 'Microsoft.Network/virtualNetworkGateways@2024-01-01' = [
]

//Minumum subnet size is /27 supporting documentation https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpn-gateway-settings#gwsub
resource resGatewaySecondaryLocation 'Microsoft.Network/virtualNetworkGateways@2024-01-01' = [
resource resGatewaySecondaryLocation 'Microsoft.Network/virtualNetworkGateways@2024-05-01' = [
for (gateway, i) in varGwConfigSecondaryLocation: if ((gateway.name != 'noconfigVpn') && (gateway.name != 'noconfigEr')) {
name: gateway.name
location: parSecondaryLocation
Expand Down Expand Up @@ -1612,25 +1612,25 @@ resource resVirtualNetworkGatewayLockSecondaryLocation 'Microsoft.Authorization/
}
]

resource resAzureFirewallSubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parAzFirewallEnabled) {
resource resAzureFirewallSubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parAzFirewallEnabled) {
parent: resHubVnet
name: 'AzureFirewallSubnet'
}

resource resAzureFirewallSubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parAzFirewallEnabledSecondaryLocation) {
resource resAzureFirewallSubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parAzFirewallEnabledSecondaryLocation) {
parent: resHubVnetSecondaryLocation
name: 'AzureFirewallSubnet'
}

resource resAzureFirewallMgmtSubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parAzFirewallEnabled && (contains(
resource resAzureFirewallMgmtSubnetRef 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parAzFirewallEnabled && (contains(
map(parSubnets, subnets => subnets.name),
'AzureFirewallManagementSubnet'
))) {
parent: resHubVnet
name: 'AzureFirewallManagementSubnet'
}

resource resAzureFirewallMgmtSubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-01-01' existing = if (parAzFirewallEnabledSecondaryLocation && (contains(
resource resAzureFirewallMgmtSubnetRefSecondaryLocation 'Microsoft.Network/virtualNetworks/subnets@2024-05-01' existing = if (parAzFirewallEnabledSecondaryLocation && (contains(
map(parSubnetsSecondaryLocation, subnets => subnets.name),
'AzureFirewallManagementSubnet'
))) {
Expand Down Expand Up @@ -1720,7 +1720,7 @@ module modAzureFirewallMgmtPublicIpSecondaryLocation '../publicIp/publicIp.bicep
}
}

resource resFirewallPolicies 'Microsoft.Network/firewallPolicies@2024-01-01' = if (parAzFirewallEnabled && parAzFirewallPoliciesEnabled) {
resource resFirewallPolicies 'Microsoft.Network/firewallPolicies@2024-05-01' = if (parAzFirewallEnabled && parAzFirewallPoliciesEnabled) {
name: parAzFirewallPoliciesName
location: parLocation
tags: parTags
Expand Down Expand Up @@ -1749,7 +1749,7 @@ resource resFirewallPolicies 'Microsoft.Network/firewallPolicies@2024-01-01' = i
}
}

resource resFirewallPoliciesSecondaryLocation 'Microsoft.Network/firewallPolicies@2024-01-01' = if (parAzFirewallEnabledSecondaryLocation && parAzFirewallPoliciesEnabledSecondaryLocation) {
resource resFirewallPoliciesSecondaryLocation 'Microsoft.Network/firewallPolicies@2024-05-01' = if (parAzFirewallEnabledSecondaryLocation && parAzFirewallPoliciesEnabledSecondaryLocation) {
name: parAzFirewallPoliciesNameSecondaryLocation
location: parSecondaryLocation
tags: parTags
Expand Down Expand Up @@ -1800,7 +1800,7 @@ resource resFirewallPoliciesLockSecondaryLocation 'Microsoft.Authorization/locks

// AzureFirewallSubnet is required to deploy Azure Firewall . This subnet must exist in the parsubnets array if you deploy.
// There is a minimum subnet requirement of /26 prefix.
resource resAzureFirewall 'Microsoft.Network/azureFirewalls@2024-01-01' = if (parAzFirewallEnabled) {
resource resAzureFirewall 'Microsoft.Network/azureFirewalls@2024-05-01' = if (parAzFirewallEnabled) {
dependsOn: [
resGateway
]
Expand Down Expand Up @@ -1904,7 +1904,7 @@ resource resAzureFirewall 'Microsoft.Network/azureFirewalls@2024-01-01' = if (pa

// AzureFirewallSubnet is required to deploy Azure Firewall . This subnet must exist in the parsubnets array if you deploy.
// There is a minimum subnet requirement of /26 prefix.
resource resAzureFirewallSecondaryLocation 'Microsoft.Network/azureFirewalls@2024-01-01' = if (parAzFirewallEnabledSecondaryLocation) {
resource resAzureFirewallSecondaryLocation 'Microsoft.Network/azureFirewalls@2024-05-01' = if (parAzFirewallEnabledSecondaryLocation) {
dependsOn: [
resGatewaySecondaryLocation
]
Expand Down Expand Up @@ -2033,7 +2033,7 @@ resource resAzureFirewallLockSecondaryLocation 'Microsoft.Authorization/locks@20
}

//If Azure Firewall is enabled we will deploy a RouteTable to redirect Traffic to the Firewall.
resource resHubRouteTable 'Microsoft.Network/routeTables@2024-01-01' = if (parAzFirewallEnabled) {
resource resHubRouteTable 'Microsoft.Network/routeTables@2024-05-01' = if (parAzFirewallEnabled) {
name: parHubRouteTableName
location: parLocation
tags: parTags
Expand All @@ -2055,7 +2055,7 @@ resource resHubRouteTable 'Microsoft.Network/routeTables@2024-01-01' = if (parAz
}

//If Azure Firewall is enabled we will deploy a RouteTable to redirect Traffic to the Firewall.
resource resHubRouteTableSecondaryLocation 'Microsoft.Network/routeTables@2024-01-01' = if (parAzFirewallEnabledSecondaryLocation) {
resource resHubRouteTableSecondaryLocation 'Microsoft.Network/routeTables@2024-05-01' = if (parAzFirewallEnabledSecondaryLocation) {
name: parHubRouteTableNameSecondaryLocation
location: parSecondaryLocation
tags: parTags
Expand Down Expand Up @@ -2096,7 +2096,7 @@ resource resHubRouteTableLockSecondaryLocation 'Microsoft.Authorization/locks@20
}
}

module modPrivateDnsZonesAVMRegion1 'br/public:avm/ptn/network/private-link-private-dns-zones:0.2.1' = if (parPrivateDnsZonesEnabled) {
module modPrivateDnsZonesAVMRegion1 'br/public:avm/ptn/network/private-link-private-dns-zones:0.3.0' = if (parPrivateDnsZonesEnabled) {
name: 'deploy-Private-DNS-Zones-AVM-${parLocation}'
scope: resourceGroup(parPrivateDnsZonesResourceGroup)
params: {
Expand All @@ -2116,7 +2116,7 @@ module modPrivateDnsZonesAVMRegion1 'br/public:avm/ptn/network/private-link-priv
}
}

module modPrivateDnsZonesAVMRegion2 'br/public:avm/ptn/network/private-link-private-dns-zones:0.2.1' = if (parPrivateDnsZonesEnabled) {
module modPrivateDnsZonesAVMRegion2 'br/public:avm/ptn/network/private-link-private-dns-zones:0.3.0' = if (parPrivateDnsZonesEnabled) {
name: 'deploy-Private-DNS-Zones-AVM-Multi-${parSecondaryLocation}'
scope: resourceGroup(parPrivateDnsZonesResourceGroup)
params: {
Expand Down
Loading

0 comments on commit 33a53d9

Please sign in to comment.